which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?
What should Katie do to ensure that this site’s content renders consistently regardless of the browser used?